We propose to study computer network traffic as a dynamical system, with the intent of determining how predictable the traffic is over short time scales. We will use passive measurements from high capacity links, so that we may investigate traffic that consists of many diverse component flows. To study network traffic as a dynamical system one must first have a concept of what variables compose the state space. Transmission Control Protocol (TCP) regulates the dynamics of flows through two primary variables, the round-trip time and congestion window. These are obvious choices for the state variables, but they are not recorded in the passive measurements. Our main contributions in this dissertation are two algorithms that estimate round-trip...
textThe primary aim of network tomography is to infer properties of networks from network traffic m...
This work proposes models, techniques and tools aimed at passively estimating the maximum achievable...
The relevance of flow-based monitoring in tasks such as the detection of anomalies and denial of use...
Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as...
The Transmission Control Protocol (TCP) has proved to be a reliable transport protocol that has with...
Abstract. A TCP flow is congestion responsive because it reduces its send window upon the appearance...
In this paper, a solution is proposed for testing TCP congestion window process in a real-life netwo...
Abstract- In this paper we develop a scheme which can help provide certain QoS via active measuremen...
Network monitoring has become a necessity to aid in the management and operation of large networks. ...
Abstract—This paper proposes a purely passive method for inferring a congestion map of a network. Th...
In this thesis, we propose several inference techniques to discover network properties for wired and...
Accurately predicting network behavior is beneficial for TCP congestion control, and can help improv...
Abstract. While several algorithms have been created to actively measure the end-to-end available ba...
Abstract. We focus in this paper on passive traffic measurement techniques that collect traces of TC...
Network monitoring involves collecting and analyzing various types of data in order to detect change...
textThe primary aim of network tomography is to infer properties of networks from network traffic m...
This work proposes models, techniques and tools aimed at passively estimating the maximum achievable...
The relevance of flow-based monitoring in tasks such as the detection of anomalies and denial of use...
Many applications in the Internet use the reliable end-to-end Transmission Control Protocol (TCP) as...
The Transmission Control Protocol (TCP) has proved to be a reliable transport protocol that has with...
Abstract. A TCP flow is congestion responsive because it reduces its send window upon the appearance...
In this paper, a solution is proposed for testing TCP congestion window process in a real-life netwo...
Abstract- In this paper we develop a scheme which can help provide certain QoS via active measuremen...
Network monitoring has become a necessity to aid in the management and operation of large networks. ...
Abstract—This paper proposes a purely passive method for inferring a congestion map of a network. Th...
In this thesis, we propose several inference techniques to discover network properties for wired and...
Accurately predicting network behavior is beneficial for TCP congestion control, and can help improv...
Abstract. While several algorithms have been created to actively measure the end-to-end available ba...
Abstract. We focus in this paper on passive traffic measurement techniques that collect traces of TC...
Network monitoring involves collecting and analyzing various types of data in order to detect change...
textThe primary aim of network tomography is to infer properties of networks from network traffic m...
This work proposes models, techniques and tools aimed at passively estimating the maximum achievable...
The relevance of flow-based monitoring in tasks such as the detection of anomalies and denial of use...